{"id":25133,"date":"2025-12-19T11:20:33","date_gmt":"2025-12-19T16:20:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25133"},"modified":"2025-12-23T17:15:20","modified_gmt":"2025-12-23T13:15:20","slug":"most-important-cybersecurity-resolutions-2026","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/most-important-cybersecurity-resolutions-2026\/25133\/","title":{"rendered":"Your personal cybersecurity checklist for 2026"},"content":{"rendered":"<p>The outgoing year of 2025 has significantly transformed our access to the Web and the ways we navigate it. Radical new laws, the rise of AI assistants, and websites scrambling to block AI bots are reshaping the internet right before our eyes. So what do you need to know about these changes, and what skills and habits should you bring with you into 2026? As is our tradition, we\u2019re framing this as eight New Year\u2019s resolutions. What are we pledging for 2026?\u2026<\/p>\n<h2>Get to know your local laws<\/h2>\n<p>Last year was a bumper crop for legislation that seriously changed the rules of the internet for everyday users. Lawmakers around the world have been busy:<\/p>\n<ul>\n<li>Banning <a href=\"https:\/\/www.reuters.com\/legal\/litigation\/australia-social-media-ban-takes-effect-world-first-2025-12-09\/\" target=\"_blank\" rel=\"noopener nofollow\">social media for teens<\/a><\/li>\n<li>Introducing <a href=\"https:\/\/www.pcmag.com\/news\/uk-online-safety-act-age-verification-social-adult-sites-how-it-works\" target=\"_blank\" rel=\"noopener nofollow\">strict age verification<\/a> (think scanning your ID) procedures to visit certain categories of websites<\/li>\n<li>Requiring <a href=\"https:\/\/www.insideprivacy.com\/childrens-privacy\/nebraska-bans-minor-social-media-accounts-without-parental-consent\/\" target=\"_blank\" rel=\"noopener nofollow\">explicit parental consent<\/a> for minors to access many online services<\/li>\n<li>Applying pressure through blocks and lawsuits against platforms that wouldn\u2019t comply with existing child protection laws \u2014 with <a href=\"https:\/\/gamerant.com\/texas-roblox-lawsuit-child-safety-ag-ken-paxton\/\" target=\"_blank\" rel=\"noopener nofollow\">Roblox<\/a> finding itself in a particularly bright spotlight<\/li>\n<\/ul>\n<p>Your best bet is to get news from sites that report calmly and without sensationalism, and to review legal experts\u2019 commentaries. You need to understand what obligations fall on you, and, if you have underage children \u2014 what changes for them.<\/p>\n<p>You might face difficult conversations with your kids about new rules for using social media or games. It\u2019s crucial that teenage rebellion doesn\u2019t lead to dangerous mistakes such as installing malware disguised as a \u201crestriction-bypassing mod\u201d, or migrating to small, unmoderated social networks. Safeguarding the younger generation requires reliable protection on their computers and smartphones, alongside <a href=\"https:\/\/me-en.kaspersky.com\/safe-kids?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksk___\" target=\"_blank\" rel=\"noopener\">parental control tools<\/a>.<\/p>\n<p>But it\u2019s not just about simple compliance with laws. You\u2019ll almost certainly encounter negative side effects that lawmakers didn\u2019t anticipate.<\/p>\n<h2>Master new methods of securing access<\/h2>\n<p>Some websites choose to geoblock certain countries entirely to avoid the complexities of complying with regional regulations. If you\u2019re certain your local laws allow access to the content, you can bypass these geoblocks by using a VPN. You need to select a server in a country where the site is accessible.<\/p>\n<p>It\u2019s important to choose a service that doesn\u2019t just offer servers in the right locations, but actually enhances your privacy \u2014 as many free VPNs can <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-wrong-with-free-vpn-services\/51721\/\" target=\"_blank\" rel=\"noopener nofollow\">effectively compromise<\/a> it. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/vpn-secure-connection?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener\">Kaspersky VPN Secure Connection<\/a>.<\/p>\n<h2>Brace for document leaks<\/h2>\n<p>While age verification can be implemented in different ways, it often involves websites using a third-party verification service. On your first login attempt, you\u2019ll be redirected to a separate site to complete one of several checks: take a photo of your ID or driver\u2019s license, use a bank card, or nod and smile for a video, and so on.<\/p>\n<p>The mere idea of presenting a passport to access adult websites is deeply unpopular with many people on principle. But beyond that, there\u2019s a serious risk of data leaks. These incidents are already a reality: data breaches have impacted a contractor used to verify <a href=\"https:\/\/www.bbc.com\/news\/articles\/c8jmzd972leo\" target=\"_blank\" rel=\"noopener nofollow\">Discord<\/a> users, as well as service providers for <a href=\"https:\/\/www.404media.co\/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix\/\" target=\"_blank\" rel=\"noopener nofollow\">TikTok and Uber<\/a>. The more websites that require this verification, the higher the risk of a leak becomes.<\/p>\n<p>So what can you do?<\/p>\n<ul>\n<li>Prioritize services that don\u2019t require document uploads. Instead, look for those utilizing alternative age verification methods such as a micro-transaction charge to a payment card, confirmation through your bank or another trusted external provider, or behavioral\/biometric analysis.<\/li>\n<li>Pick the least sensitive and easiest-to-replace document you have, and use only that one for all verifications. \u201cLeast sensitive\u201d in this case means containing minimal personal data, and not referencing other primary identifiers like a national ID number.<\/li>\n<li>Use a separate, dedicated email address and phone number in combination with that document. For the sites and services that don\u2019t verify your identity, use completely different contact details. This makes it much harder for your data to be easily pieced together from different leaks.<\/li>\n<\/ul>\n<h2>Learn scammers\u2019 new playbook<\/h2>\n<p>It\u2019s highly likely that under the guise of \u201cage verification\u201d, scammers will begin phishing for personal and payment data, and pushing malware onto visitors. After all, it\u2019s very tempting to simply copy and paste some text on your computer instead of uploading a photo of your passport. Currently, <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">ClickFix attacks<\/a> are mostly disguised as CAPTCHA checks, but age verification is the logical next step for these schemes. How to lower these risks?<\/p>\n<ul>\n<li>Carefully check any websites that require verification. <strong>Do not complete the verification<\/strong> if you\u2019ve already done it for that service before, or if you landed on the verification page via a link from a messaging app, search engine, or ad.<\/li>\n<li>Never download apps or copy and paste text for verification. All legitimate services operate within the browser window, though sometimes desktop users are asked to switch to a smartphone to complete the check.<\/li>\n<li>Analyze and be suspicious of any situation that requires entering a code received via a messaging app or SMS to access a website or confirm an action. This is often a scheme to <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing\/53012\/\" target=\"_blank\" rel=\"noopener nofollow\">hijack your messaging account or another critical service<\/a>.<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">reliable security software on all your computers and smartphones<\/a> to help block access to scam sites. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> \u2014 it provides: a secure VPN, malware protection, alerts if your personal data appears in public leaks, a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>, <a href=\"https:\/\/me-en.kaspersky.com\/safe-kids?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksk___\" target=\"_blank\" rel=\"noopener\">parental controls<\/a>, and much more.<\/li>\n<\/ul>\n<h2>Cultivate healthy AI usage habits<\/h2>\n<p>Even if you\u2019re not a fan of AI, you\u2019ll find it hard to avoid: it\u2019s literally being shoved into each everyday service: Android, Chrome, MS Office, Windows, iOS, Creative Cloud\u2026 the list is endless. As with fast food, television, TikTok, and other easily accessible conveniences, the key is striking a balance between the healthy use of these assistants and developing an addiction.<\/p>\n<p><strong>Identify the areas where your mental sharpness and personal growth matter most to you. <\/strong>A person who doesn\u2019t run regularly lowers their fitness level. Someone who always uses GPS navigation gets worse at reading paper maps. Wherever you value the work of your mind, offloading it to AI is a path to losing your edge. Maintain a balance: regularly do that mental work yourself \u2014 even if AI can do it well \u2014 from translating text to looking up info on Wikipedia. You don\u2019t have to do it all the time, but remember to do it at least some of the time. For a more radical approach, you can also <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-disable-gemini-on-android\/53771\/\" target=\"_blank\" rel=\"noopener nofollow\">disable AI services wherever possible<\/a>.<\/p>\n<p><strong>Know where the cost of a mistake is high.<\/strong> Despite developers\u2019 best efforts, AI can sometimes deliver completely wrong answers with total confidence. These so-called hallucinations are unlikely to be fully eradicated anytime soon. Therefore, for important documents and critical decisions, either avoid using AI entirely, or scrutinize its output with extreme care. Check every number, every comma.<\/p>\n<p>In other areas, feel free to experiment with AI. But even for seemingly harmless uses, remember that mistakes and hallucinations are a real possibility.<\/p>\n<p><strong>How to lower the risk of leaks. <\/strong>The more you use AI, the more of your information goes to the service provider. Whenever possible, prioritize AI features that run entirely on your device. This category includes things like the protection against fraudulent sites in Chrome, text translation in Firefox, the rewriting assistant in iOS, and so on. You can even run a full-fledged chatbot <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-ai-locally-and-securely\/50576\/\" target=\"_blank\" rel=\"noopener nofollow\">locally on your own computer<\/a>.<\/p>\n<p><strong>AI agents need close supervision<\/strong>. The agentic capabilities of AI \u2014 where it doesn\u2019t just suggest but actively does work for you \u2014 are especially risky. Thoroughly research the <a href=\"https:\/\/www.kaspersky.com\/blog\/ai-phishing-and-scams\/54445\/\" target=\"_blank\" rel=\"noopener nofollow\">risks in this area<\/a> before trusting an agent with online shopping or booking a vacation. And use modes where the assistant asks for your confirmation before entering personal data \u2014 let alone buying anything.<\/p>\n<h2>Audit your subscriptions and plans<\/h2>\n<p>The economics of the internet is shifting right before our eyes. The AI arms race is driving up the cost of components and computing power, tariffs and geopolitical conflicts are disrupting supply chains, and baking AI features into familiar products sometimes comes with a price hike. Practically any online service can get more expensive overnight \u2014 sometimes by double-digit percentages. Some providers are taking a different route, moving away from a fixed monthly fee to a pay-per-use model for things like songs downloaded or images generated.<\/p>\n<p>To avoid nasty surprises when you check your bank statement, make it a habit to review the terms of all your paid subscriptions at least three or four times a year. You might find that a service has updated its plans and that you need to downgrade to a simpler one. Or a service might have quietly signed you up for an extra feature you\u2019re not even aware of \u2014 and you need to disable it. Some services might be better switched to a free tier or canceled altogether. Financial literacy is becoming a must-have skill for managing your digital spending.<\/p>\n<p>To get a complete picture of your subscriptions and truly understand how much you\u2019re spending on digital services each month or year, it\u2019s best to track them all in one place. A simple Excel or Google Docs spreadsheet works, but a dedicated app like <a href=\"https:\/\/subscrabapp.onelink.me\/Z5GS\/qftmi699\" target=\"_blank\" rel=\"noopener nofollow\">SubsCrab<\/a> is more convenient. It sends reminders for upcoming payments, shows all your spending month-by-month, and can even help you find better deals on the same or similar services.<\/p>\n<h2>Prioritize the longevity of your tech<\/h2>\n<p>The allure of powerful new processors, cameras, and AI features might tempt you to buy a new smartphone or laptop in 2026, but planning for making it last for several years should be a priority. There are a few reasons\u2026<\/p>\n<p>First, the pace of meaningful new features has slowed, and the urge to upgrade frequently has diminished for many. Second, gadget prices have risen significantly due to more expensive chips, labor, and shipping \u2014 making major purchases harder to justify. Furthermore, regulations like those in the EU now require easily replaceable batteries in new devices, meaning the part that wears out the fastest in a phone will be simpler and cheaper to swap out yourself.<\/p>\n<p>So, what does it take to make sure your smartphone or laptop reliably lasts several years?<\/p>\n<ul>\n<li><strong>Physical protection.<\/strong> Use cases, screen protectors, and maybe even a waterproof pouch.<\/li>\n<li><strong>Proper storage.<\/strong> Avoid extreme temperatures, don\u2019t leave it baking in direct sun or freezing overnight in a car at -15\u00b0C.<\/li>\n<li><strong>Battery care.<\/strong> Avoid regularly draining it to single-digit percentages.<\/li>\n<li><strong>Regular software updates.<\/strong> This is the trickiest part. Updates are essential for security to protect your phone or laptop from new types of attacks. However, updates can sometimes cause slowdowns, overheating, or battery drain. The prudent approach is to wait about a week after a major OS update, check feedback from users of your exact model, and only install it if the coast seems clear.<\/li>\n<\/ul>\n<h2>Secure your smart home<\/h2>\n<p>The smart home is giving way to a new concept: the intelligent home. The idea is that neural networks will help your home make its own decisions about what to do and when, all for your convenience \u2014 without needing pre-programmed routines. Thanks to the Matter 1.3 standard, a smart home can now manage not just lights, TVs, and locks, but also kitchen appliances, dryers, and even EV chargers! Even more importantly, we\u2019re seeing a rise in devices where Matter over Thread is the native, primary communication protocol, like the new IKEA KAJPLATS lineup. Matter-powered devices from different vendors can see and communicate with each other. This means you can, say, buy an Apple HomePod as your smart home central hub and connect Philips Hue bulbs, Eve Energy plugs, and IKEA BILRESA switches to it.<\/p>\n<p>All of this means that smart and intelligent homes will become more common \u2014 and so will the ways to attack them. We have a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed article<\/a> on smart home security, but here are a few key tips relevant in light of the transition to Matter.<\/p>\n<ul>\n<li>Consolidate your devices into a single <a href=\"https:\/\/matter-smarthome.de\/en\/know-how\/what-is-a-matter-fabric\/\" target=\"_blank\" rel=\"noopener nofollow\">Matter fabric<\/a>. Use the minimum number of controllers, for example, one Apple TV + one smartphone. If a TV or another device accessible to many household members acts as a controller, be sure to use password security and other available restrictions for critical functions.<\/li>\n<li>Choose a hub and controller from major manufacturers with a serious commitment to security.<\/li>\n<li>Minimize the number of devices connecting your Matter fabric to the internet. These devices \u2014 referred to as Border Routers \u2014 must be well-protected from external cyberattacks, for example, by restricting their access at the level of your home internet router.<\/li>\n<li>Regularly audit your home network for any suspicious, unknown devices. In your Matter fabric, this is done via your controller or hub, and in your home network \u2014 via your primary router or a feature like Smart Home Monitor in <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Eight digital New Year&#8217;s resolutions you absolutely need to keep.<\/p>\n","protected":false},"author":2722,"featured_media":25134,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2088,1481,2719,577,187,43,695,321,131],"class_list":{"0":"post-25133","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-ai","10":"tag-fakes","11":"tag-messengers","12":"tag-passwords","13":"tag-privacy","14":"tag-scam","15":"tag-technology","16":"tag-tips-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/most-important-cybersecurity-resolutions-2026\/25133\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/most-important-cybersecurity-resolutions-2026\/30066\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/most-important-cybersecurity-resolutions-2026\/13070\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/most-important-cybersecurity-resolutions-2026\/29948\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/most-important-cybersecurity-resolutions-2026\/28857\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/most-important-cybersecurity-resolutions-2026\/30380\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/most-important-cybersecurity-resolutions-2026\/41128\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/most-important-cybersecurity-resolutions-2026\/14155\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/most-important-cybersecurity-resolutions-2026\/55069\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/most-important-cybersecurity-resolutions-2026\/23493\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/most-important-cybersecurity-resolutions-2026\/33067\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/most-important-cybersecurity-resolutions-2026\/30146\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/most-important-cybersecurity-resolutions-2026\/35834\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/most-important-cybersecurity-resolutions-2026\/35490\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25133"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25133\/revisions"}],"predecessor-version":[{"id":25138,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25133\/revisions\/25138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25134"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}